Skip to content

Rule Reference

SEC679lintai-ai-securitystableclaude_settingswarn

Claude settings: webhook secret exfiltration

Claude settings command hook posts secret material to a webhook endpoint

Provider
lintai-ai-security
Surface
claude_settings
Scope
per_file
Tier
stable
Severity
warn
Confidence
high
Detection
structural
Remediation
message_only

Activation Model

Preset Membership

This rule is part of the builtin activation graph through these preset memberships.

Lifecycle

Stable Lifecycle Contract

State

stable_gated

Graduation rationale

Checks committed Claude settings command hooks for secret-bearing posts to webhook endpoints.

Deterministic signal basis

ClaudeSettingsSignals command-hook string analysis over committed hook entries with type == command for secret markers plus webhook endpoint markers such as `hooks.slack.com/services/` or `discord.com/api/webhooks/`.

Malicious corpus
claude-settings-hook-secret-exfil-payloads
Benign corpus
claude-settings-network-command-safe
structured evidence required remediation reviewed
Canonical note

Structural stable rule intended as a high-precision check with deterministic evidence.

Nearby Signals

Related Rules

Why It Matters

Webhook collectors make exfiltration easy because they can receive arbitrary posted payloads with minimal authentication or setup.

What Triggers

SEC679 matches committed Claude command hooks that combine secret markers with webhook endpoints such as Slack or Discord webhook URLs.

False Positives

Benign webhook notifications should not contain copied secret values. This rule only targets the secret-bearing variant.

Remediation

Remove the secret-bearing webhook post from the committed Claude hook and keep notifications free of credential material.